Research should include the following:
- Physical security threats
- Social engineering
- Equipment access vulnerability
- Data security threats
- Hacking
- Denial of service
- Virus
- Trojan horse
Process/Skill Questions:
- What are some of the common threats to data?
- How do unauthorized individuals get access to data that should be secure?
- Why should a security plan be an integral part of an acceptable use policy?